From: "Radim Krčmář" <rkrcmar@redhat.com>
To: Wanpeng Li <kernellwp@gmail.com>
Cc: "linux-kernel@vger.kernel.org" <linux-kernel@vger.kernel.org>,
kvm <kvm@vger.kernel.org>, Paolo Bonzini <pbonzini@redhat.com>,
"Lan, Tianyu" <tianyu.lan@intel.com>,
Igor Mammedov <imammedo@redhat.com>,
Jan Kiszka <jan.kiszka@web.de>, Peter Xu <peterx@redhat.com>,
Yang Zhang <yang.zhang.wz@gmail.com>
Subject: Re: [PATCH v3 03/14] KVM: x86: use physical LAPIC array for logical x2APIC
Date: Tue, 2 Aug 2016 16:22:57 +0200 [thread overview]
Message-ID: <20160802142257.GB15846@potion> (raw)
In-Reply-To: <CANRm+Cwmgx7Hiq2gnBuLLfKfiNy02rtCCveaQpfDFHPQ3+T--g@mail.gmail.com>
2016-08-02 21:46+0800, Wanpeng Li:
> 2016-07-13 4:09 GMT+08:00 Radim Krčmář <rkrcmar@redhat.com>:
>> Logical x2APIC IDs map injectively to physical x2APIC IDs, so we can
>> reuse the physical array for them. This allows us to save space by
>> separating logical xAPIC maps.
>>
>> Signed-off-by: Radim Krčmář <rkrcmar@redhat.com>
>> ---
>> arch/x86/include/asm/kvm_host.h | 6 ++--
>> arch/x86/kvm/lapic.c | 69 +++++++++++++++++++++--------------------
>> 2 files changed, 39 insertions(+), 36 deletions(-)
>>
>> diff --git a/arch/x86/include/asm/kvm_host.h b/arch/x86/include/asm/kvm_host.h
>> index 53d39771842b..3194b19b9c7b 100644
>> --- a/arch/x86/include/asm/kvm_host.h
>> +++ b/arch/x86/include/asm/kvm_host.h
>> @@ -683,8 +683,10 @@ struct kvm_apic_map {
>> struct rcu_head rcu;
>> u8 mode;
>> struct kvm_lapic *phys_map[256];
>> - /* first index is cluster id second is cpu id in a cluster */
>> - struct kvm_lapic *logical_map[16][16];
>> + union {
>> + struct kvm_lapic *xapic_flat_map[8];
>> + struct kvm_lapic *xapic_cluster_map[16][4];
>> + };
>> };
>>
>> /* Hyper-V emulation context */
>> diff --git a/arch/x86/kvm/lapic.c b/arch/x86/kvm/lapic.c
>> index 2987843657db..9880d03f533d 100644
>> --- a/arch/x86/kvm/lapic.c
>> +++ b/arch/x86/kvm/lapic.c
>> @@ -115,26 +115,36 @@ static inline int apic_enabled(struct kvm_lapic *apic)
>> (LVT_MASK | APIC_MODE_MASK | APIC_INPUT_POLARITY | \
>> APIC_LVT_REMOTE_IRR | APIC_LVT_LEVEL_TRIGGER)
>>
>> -/* The logical map is definitely wrong if we have multiple
>> - * modes at the same time. (Physical map is always right.)
>> - */
>> -static inline bool kvm_apic_logical_map_valid(struct kvm_apic_map *map)
>> -{
>> - return !(map->mode & (map->mode - 1));
>> -}
>> +static inline bool kvm_apic_map_get_logical_dest(struct kvm_apic_map *map,
>> + u32 dest_id, struct kvm_lapic ***cluster, u16 *mask) {
>> + switch (map->mode) {
>> + case KVM_APIC_MODE_X2APIC: {
>> + u32 offset = (dest_id >> 16) * 16;
>> + u32 max_apic_id = ARRAY_SIZE(map->phys_map) - 1;
>> + if (offset <= max_apic_id) {
>> + u8 cluster_size = min(max_apic_id - offset + 1, 16U);
>> + *cluster = &map->phys_map[offset];
>> + *mask = dest_id & (0xffff >> (16 - cluster_size));
>> + } else {
>> + *mask = 0;
>> + }
>> + return true;
>> + }
>> + case KVM_APIC_MODE_XAPIC_FLAT:
>> + *cluster = map->xapic_flat_map;
>> + *mask = dest_id & 0xff;
>> + return true;
>> + case KVM_APIC_MODE_XAPIC_CLUSTER:
>> + *cluster = map->xapic_cluster_map[dest_id >> 4];
>> + *mask = dest_id & 0xf;
>> + return true;
>> + default:
>> + /* Not optimized. */
>> + return false;
>> + }
>
> As the comments of the removed function kvm_apic_logical_map_valid()
> mentioned: "The logical map is definitely wrong if we have multiple
> modes at the same time". So once one lapic offend this, we will just
> skip it. However, the offend mode is still not removed from the
> new->mode, which results in all the lapics after the offend one will
> be skipped and they can't get the benefit of the apic map table. I can
> make a patch once it make sense to you.
Offending LAPIC marks the logical mapping as unusable, which was
intended. kvm_apic_map_get_logical_dest() returns false.
The main problem is that SDM does not clearly forbid LAPICs in x2APIC
mode while some xAPIC LAPICs have nonzero LDR, so we should handle it
somewhat gracefully.
In combination with our IR-less IOAPIC hack, this would mean that we
would have to check both interpretations (x2 and xAPIC) of a logical
address before delivering. Not to mention that we would also have to
decide how to handle a case when both interpretations are valid.
Mixed logical mode is rare and the slow path works fine with it, so I
think it doesn't make sense to do more than what we do now, i.e. detect
mixed in the fast path and fall back to the slow path.
(The map needs to keep a mode in any case, so we're not losing much by
remembering that the mode is weird.)
next prev parent reply other threads:[~2016-08-02 14:22 UTC|newest]
Thread overview: 32+ messages / expand[flat|nested] mbox.gz Atom feed top
2016-07-12 20:09 [PATCH v3 00/14] KVM: x86: break the xAPIC barrier Radim Krčmář
2016-07-12 20:09 ` [PATCH v3 01/14] KVM: x86: bump KVM_SOFT_MAX_VCPUS to 240 Radim Krčmář
2016-07-12 20:09 ` [PATCH v3 02/14] KVM: x86: add kvm_apic_map_get_dest_lapic Radim Krčmář
2016-07-12 20:09 ` [PATCH v3 03/14] KVM: x86: use physical LAPIC array for logical x2APIC Radim Krčmář
2016-08-02 13:46 ` Wanpeng Li
2016-08-02 14:22 ` Radim Krčmář [this message]
2016-08-02 16:40 ` Nadav Amit
2016-07-12 20:09 ` [PATCH v3 04/14] KVM: x86: dynamic kvm_apic_map Radim Krčmář
2016-07-13 8:29 ` Paolo Bonzini
2016-07-13 14:37 ` Radim Krčmář
2016-08-02 11:39 ` Wanpeng Li
2016-08-02 12:22 ` Radim Krčmář
2016-08-02 13:15 ` Wanpeng Li
2016-07-12 20:09 ` [PATCH v3 05/14] KVM: x86: use generic function for MSI parsing Radim Krčmář
2016-07-12 20:09 ` [PATCH v3 06/14] KVM: x86: use hardware-compatible format for APIC ID register Radim Krčmář
2016-07-12 20:09 ` [PATCH v3 07/14] KVM: x86: reset APIC ID when enabling LAPIC Radim Krčmář
2016-08-02 13:26 ` Wanpeng Li
2016-08-02 13:52 ` Radim Krčmář
2016-07-12 20:09 ` [PATCH v3 08/14] KVM: VMX: optimize APIC ID read with APICv Radim Krčmář
2016-07-12 20:09 ` [PATCH v3 09/14] KVM: x86: reset lapic base in kvm_lapic_reset Radim Krčmář
2016-07-12 20:09 ` [PATCH v3 10/14] KVM: pass struct kvm to kvm_set_routing_entry Radim Krčmář
2016-07-12 20:09 ` [PATCH v3 11/14] KVM: x86: add KVM_CAP_X2APIC_API Radim Krčmář
2016-07-13 8:41 ` Paolo Bonzini
2016-07-13 14:40 ` Radim Krčmář
2016-07-12 20:09 ` [PATCH v3 12/14] KVM: x86: add a flag to disable KVM x2apic broadcast quirk Radim Krčmář
2016-07-13 8:38 ` Paolo Bonzini
2016-07-13 15:14 ` Radim Krčmář
2016-07-13 15:30 ` Paolo Bonzini
2016-07-13 10:15 ` Paolo Bonzini
2016-07-13 14:52 ` Radim Krčmář
2016-07-12 20:09 ` [PATCH v3 13/14] KVM: x86: bump MAX_VCPUS to 288 Radim Krčmář
2016-07-12 20:09 ` [PATCH v3 14/14] KVM: x86: bump KVM_MAX_VCPU_ID to 1023 Radim Krčmář
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20160802142257.GB15846@potion \
--to=rkrcmar@redhat.com \
--cc=imammedo@redhat.com \
--cc=jan.kiszka@web.de \
--cc=kernellwp@gmail.com \
--cc=kvm@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=pbonzini@redhat.com \
--cc=peterx@redhat.com \
--cc=tianyu.lan@intel.com \
--cc=yang.zhang.wz@gmail.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).